Intelligence
highVulnerabilityEmerging

Schneider Electric DCE Hard-Coded Credentials Enable Authenticated RCE in Critical Infrastructure Monitoring

Schneider Electric's EcoStruxure Data Center Expert contains hard-coded credentials that, combined with an optional SOCKS proxy feature, allow authenticated attackers to compromise the monitoring platform. This threatens visibility and control of critical data center infrastructure.

S
Sebastion

Affected

Schneider Electric EcoStruxure IT Data Center Expert ≤9.0Schneider Electric EcoStruxure IT Data Center Expert 9.1

This vulnerability represents a classic but dangerous authentication weakness in industrial control systems (ICS) software. The presence of hard-coded credentials in a monitoring platform designed to aggregate and distribute sensitive infrastructure data creates a significant attack surface, particularly in organizations that enable the SOCKS proxy feature for remote access or cross-network communication.

The technical attack chain likely involves: (1) gaining initial network access to the DCE system, (2) leveraging the hard-coded credentials to authenticate as an administrative user, and (3) exploiting the SOCKS proxy feature to pivot deeper into the data center network or exfiltrate monitoring data. While the vulnerability requires the SOCKS proxy to be explicitly enabled, security configuration defaults are frequently overridden in operational environments for convenience or troubleshooting—making this restriction less effective in practice.

Data Center Expert is deployed across multiple critical infrastructure verticals (financial services, healthcare, energy) where monitoring system compromise translates directly to operational risk. An attacker gaining administrative access could modify monitoring configurations, suppress alerts, or redirect traffic, effectively blinding operators to infrastructure problems or enabling secondary attacks.

Organizations should immediately: (1) inventory all DCE deployments and verify SOCKS proxy status, (2) audit access logs for suspicious authentication patterns, (3) apply Schneider Electric's remediation patches urgently, (4) implement network segmentation isolating DCE systems, and (5) enforce multi-factor authentication where possible as a compensating control.

This advisory reflects a broader pattern of OT software vendors shipping with hard-coded credentials, suggesting inadequate secure development practices in the industrial sector. The four-year version window affected (≤9.1) indicates this may have existed for an extended period, increasing likelihood of silent exploitation in mature environments.